I love it when technology helps connect people. I love it when I can finally see the person I’ve been talking to on the phone and via email for months. I love it when distance becomes irrelevant in sharing knowledge and opinions in real time….even when we’re continents apart.
That’s why I loved every minute of yesterday’s virtual event our Italian team (@CiscoItalia) hosted with Guy Kawasaki (@GuyKawasaki). The concept was simple: connect ~30 Cisco guests in Italy with US social media personality, Guy Kawasaki for an hour of social media pow wow. Did I mention without any travel? The event was delivered over TelePresence in 3 different locations: Milan, Rome and Santa Clara TelePresence Suites (@TelePresence) as part of the Italian team’s #ideaimpresa initiative. This program aims at showcasing new ways to collaborate – wherever we are.
Questions ranged from tips for small medium businesses (SMBs) to the ever-so-popular question: are we overwhelming our fans and followers with information? Guy had an interesting point of view Read More »
Many believe that number 13 equals bad luck. And on Friday the 13thsome may take extra precautions to ensure nothing bad happens. There are literally hundreds of myths out there around things that could bring bad luck: a black cat crossing your path, walking under ladders, and breaking mirrors, to name a few.
One thing that’s guaranteed to bring good luck to all, however, is watching the latest Partner Update newscast. What could be more lucky than getting all of the latest Cisco partner news in less than five minutes?
It’s been a busy week! In this newscast, we share ways that Cisco is simplifying and making easier to do business with us, we cover the top networking myths, new IT cloud and print solutions, give you a recap of our B2B lead generation and marketing webcast with tips on turning leads into customers, a way to turn your customers’ old networking equipment into money for you, showcase B2B blogging tips, and highlight our Tweet of the Week.
Keep reading for highlights and links to everything we covered in this week’s Partner Update along with timestamps so you can easily jump to each item. Read More »
I went to the #social4good event last night at Stanford which featured guest speakers actor, Kevin Bacon and author of the book “The Dragonfly Effect”, Jennifer Aaker. I am always curious to learn about how other people and industries use social media so I was looking forward to hearing interesting tidbits on what else….social media for social good. Kevin Bacon took the stage (no pun intended!) to share his thoughts on the concept of six degrees of separation and how it triggered the birth of www.sixdegrees.org. Did you know he first thought the notion of six degrees Read More »
I’ll admit I was surprised to hear so many people check their phones even before having a morning cup of coffee, mostly because I didn’t realize other people did that, too!
This phenomena probably won’t be as surprising in a few years when there will be one mobile device for every person on Earth, according to the Connected World Report, 2010.
While these stats may sound like drivel, they actually underscore the importance that a reliable network plays (and will play) for an increasingly mobile workforce — not just for those people checking Facebook under the covers.
Let’s face it: a network built on “good enough” equipment isn’t going to deliver the same experience as one using next-generation equipment designed for the loads of today’s demanding applications—including voice, video, and data.
Curious about the importance of the network as it relates to mobile? Head over to Silicon Angle where Mike Rau (Vice President, CTO for the Borderless Network Architecture at Cisco) blogged on myth number one --The Single-Purpose Network Myth.
In the post, Mike explains that a good enough network is not designed to handle the needs of an increasingly mobile population, but is built to serve the single purpose of connecting users to resources in silos of connectivity. As mobility demands on the enterprise increase, he indicates that it becomes critical that an end user is consistently managed as they access the network, whether over a wired, wireless, or VPN connection.
The next wave of spam is now making its way into social networks. One example of this type of threat is the Koobface malware, distributed through social networks such as Facebook. Koobface tricked users into downloading the malware, which then spread via the network of trusted friends. (For more details please read Unsociable: Social Media Brings a New Wave of Threats)
Facebook recognized this malware was a major problem. The trick to solving it, though, was determining how to distinguish the behavior of a bot acting like a human from the behavior of a real human. The initial answer seemed clear: selectively use a “captcha.” A captcha is the squiggly letters or numbers with interspersed lines that websites use to verify the user is a real person, not a bot. It’s very difficult for a machine to read the captcha and enter the right characters. (IMHO it is difficult for a person to enter the right characters, too—so no wonder a bot can’t do it.)